Registration number (WIID)Project No.TitleStatus
63755ISO/IEC 18031:2011/Amd 1:2017Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generationAtcelts
39733ISO/IEC TR 15443-1:2005Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and frameworkAtcelts
69379ISO/IEC 27002:2013/Cor 2:2015Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2Atcelts
42506ISO/IEC 27007:2011Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
28232ISO/IEC 9796-2:1997Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-functionAtcelts
45637ISO/IEC 10118-2:2000/Cor 2:2007Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2Atcelts
44753ISO/IEC 9796-2:2002/Amd 1:2008Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1Atcelts
46435ISO/IEC 18033-3:2005/Cor 3:2008Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .Atcelts
56891ISO/IEC 27000:2012Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
Displaying 261-270 of 793 results.